Download now Free registration required
Modern Smartphones that implement permission-based security mechanisms suffer from attacks by colluding applications. Users are not made aware of possible implications of application collusion attacks - quite the contrary - on existing platforms, users are implicitly led to believe that by approving the installation of each application independently, they can limit the damage that an application can cause. The authors implement and analyze a number of covert and overt communication channels that enable applications to collude and therefore indirectly escalate their permissions.
- Format: PDF
- Size: 265.06 KB